Re: [v6ops] Fwd: New Version Notification for draft-collink-v6ops-ent64pd-01.txt

Brian E Carpenter <brian.e.carpenter@gmail.com> Sun, 01 January 2023 19:00 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96016C14F743 for <v6ops@ietfa.amsl.com>; Sun, 1 Jan 2023 11:00:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wdL1Dm3Z8JHi for <v6ops@ietfa.amsl.com>; Sun, 1 Jan 2023 11:00:05 -0800 (PST)
Received: from mail-pj1-x1035.google.com (mail-pj1-x1035.google.com [IPv6:2607:f8b0:4864:20::1035]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DAD5C14F723 for <v6ops@ietf.org>; Sun, 1 Jan 2023 11:00:05 -0800 (PST)
Received: by mail-pj1-x1035.google.com with SMTP id ge16so24325013pjb.5 for <v6ops@ietf.org>; Sun, 01 Jan 2023 11:00:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=aD074MqfY4vrsqcOJy8AruikLEruiL10P6wL+0WwXr4=; b=XIpt5FDiu7QSeZ2N+SstpBKQGg5uy/OrTQ/mhjmg5IJWOxvwFZNhh1I1cdFe4P7cNb PA1y7LSz7YanQvGM5WDVvAT9Iic5d0Ux2X+4tVtPX6clprw90adZ/ARa1dxpy2AaCwl4 tyATN1Nn3pds3EtGIZghxDk5Q7tSBc+QGgyPgFcKyZMkDDGw6TYCFPotn6MOkYkdhaVV /1rjLZAyUJ65o9v5C+fdfUdQORLtxPd736hXfCo1sQ/XBO+Y0bJNBKuOMUM6R8P/VSAt BAo3LuQKxqT8EnhBbydra03Sm467UIgAKAkKgbHbWbhq2Y60QNMxvDyMbEhRg/QdBQtN Ti1A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=aD074MqfY4vrsqcOJy8AruikLEruiL10P6wL+0WwXr4=; b=p7IpX6hrldf0RiwHcC5s6fZxpiHK8MXn9wwDmo/pJuGM/kdOYZ+gPcVEW2gZpbOiSP fBckUWbJLYOw9+maTqkp9b6s0My6JTnGl4ixcSCEnojZi/3J05ltf/o4vGOeSsRqR9UY 3ztvsm5Yfn/tPxWw/CKrSMZC2i+cQaHl4vlzj8rqkPmlh3CPN2O5fHY4MWVoRAY1bLgj sSTizlQOf6hqFrbm/0MUDW7xi1dKyWsC/DWAIed0pcuvwJVS+/Hg+d0vGcW5ZlE9GSPx oMXVVmhTNMGcWjRGrcfKmo5EjweBMy7SnwZA0Wh89JJ3J0s31p49QUIVP/TnTNkj50Ol 43Vw==
X-Gm-Message-State: AFqh2krL9QoqIGbAol5Z/H6jzBnO9xPTYPnP0SaRfSVwPc+La7HyE3bB 9aT67U9tW0seQKU3wvKb4i8=
X-Google-Smtp-Source: AMrXdXtVzDTSmGsIbO+GaFV9R0o6H5bmZ19Hj3JDTcuzfwMOrjO6rqPJtXK+EDr/UkHPaQb5qE2evw==
X-Received: by 2002:a17:903:ca:b0:192:9fda:7665 with SMTP id x10-20020a17090300ca00b001929fda7665mr13219335plc.53.1672599602835; Sun, 01 Jan 2023 11:00:02 -0800 (PST)
Received: from ?IPV6:2406:e003:10c2:2501:6969:5efe:7979:3937? ([2406:e003:10c2:2501:6969:5efe:7979:3937]) by smtp.gmail.com with ESMTPSA id k11-20020a170902c40b00b001926a76e8absm15571613plk.114.2023.01.01.11.00.00 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 01 Jan 2023 11:00:01 -0800 (PST)
Message-ID: <09dbfb4b-5718-3d2b-edd5-1bb7f3092e25@gmail.com>
Date: Mon, 02 Jan 2023 07:59:57 +1300
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0
Content-Language: en-US
To: Martin Huněk <martin.hunek@tul.cz>, v6ops@ietf.org, Fernando Gont <fernando@gont.com.ar>
References: <167107554671.48477.568330207202509840@ietfa.amsl.com> <1915264.fIoEIV5pvu@asclepius.adm.tul.cz> <b069b751-ff7a-6389-3fe4-f06275fd1e89@gont.com.ar> <2135871.Mh6RI2rZIc@asclepius.adm.tul.cz>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
In-Reply-To: <2135871.Mh6RI2rZIc@asclepius.adm.tul.cz>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/wi0AaqUJfUNjdfrid0p4uFvzFi0>
Subject: Re: [v6ops] Fwd: New Version Notification for draft-collink-v6ops-ent64pd-01.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Jan 2023 19:00:09 -0000

On 02-Jan-23 01:50, Martin Huněk wrote:
> Hello Fernando,
> 
> Dne sobota 31. prosince 2022 1:01:23 CET, Fernando Gont napsal(a):
>> Hello, Martin,
>>
>> On 22/12/22 18:40, Martin Huněk wrote:
>> [...]
>>>>>>
>>>>>> Completely understood. But the bad old days of using the MAC
>>>>>> address to create the IID are gone, and numbering hosts from 1
>>>>>> upwards would be extremely helpful for some kinds of attack.
>>>>>
>>>>> Again, I do not suggest that it should, by default, number
>>>>> hosts/services from 1 upwards. I'm saying that when (and only
>>>>> when) the device is providing service to the Internet, the IID on
>>>>> which the service is listening should be predictable.
>>>>
>>>> No. It does not need to be predictable -- that's one of the reasons
>>>> for which you have the DNS. If anything, it needs to be stable, to
>>>> avoid the hassle (and glitches) to perform DNS updates regularly.
>>>
>>> That's precisely why it must be predictable, so the admin is actually
>>> able to put it into the DNS. Or at least it needs to be predictable
>>> to the admin.
>>
>> It doesn't need to be predictable, If anything, it has to be stable
>> (indeed, these two characteristics are design goals of RFC7217).
>>
> There is not even a stability requirement in this document. It seems that it is strictly up to the host implementation. If this should be the SLAAC replacement, then it is not worse than the SLAAC in this aspect. However, if this should be something balancing the lack of DHCPv6 support on some platform/vendor, stable IID is not enough - it has to be predictable.

Martin, that is *your* requirement, it seems, but from a privacy point of view, unpredicatability is a requirement. That is a conflict of requirements, and that's
why we have alternative solutions.

In such cases a detailed secenario analysis is needed, so that the conflict
can be stated very precisely.

>>
>>> As a network admin, I know the following: - Client's DUID - Client's
>>> Link-local address - Delegated prefix - Maybe the MAC address
>>>
>>> I do not know the IID, so I cannot know the IPv6 address needed to
>>> make an AAAA record. This I know with DHCPv6, and I knew that back in
>>> the days when only EUI-64 was used with SLAAC. Also, in the draft,
>>> there is no stability requirement.
>>
>> If you use DHCPv6, then you know the addresses, because you're leasing them.
>>
> Yes, when using DHCPv6, you can do that. However, not the case for the DHCPv6-PD discussed in the referenced document. You would not know the IID used by the host inside the delegated prefix - that is the problem.

It actually isn't a human operator who needs to know the address. It's whatever software creates the AAAA record. That can certainly be automated, but the authorization and authentication mechanisms must be defined. This is necessary as part of an overall
delegation mechanism, and I don't mean to say that it's trivial.

     Brian

> 
>> OTOH, if you use SLAAC, you're somehow advocating for hosts to do their
>> own thing -- so it shouldn't be you registering addresses in the DNS,
>> but the hosts tehmselves should do it with Dynamic DNS updates.
>>
> Allowing the unrestricted Dynamic DNS would be a security issue, and from what I know, there is no way how to indicate to the device what domain name it is allowed to modify/register when using SLAAC. It is sort of open access to the network with no trust established. So only viable solution to allow Dynamic DNS would be a separate sub-domain per network segment. But even this way, there are risks for the domain. That is why you want to keep the domain under manual control - but this way, you cannot use SLAAC (nor DHCPv6-PD in its current state).
>>
>>
>>> Long story short, if we keep overlooking the need for
>>> autoconfiguration predictability in the name of privacy, we will end
>>> up with hosts with privately generated addresses that will use IPv4
>>> only, as there would be no IPv6 autoconfigured services in the DNS.
>>
>> If you want managed configuration, you do DHCPv6, not SLAAC -- slaac is,
>> in a way, configuaration anarchy.
>>
> I agree. The DHCPv6 is now the only way. No DHCPv6-PD as it is written in this document and no SLAAC after EUI-64 has been replaced.
>>
>>
>>> Even with stable privacy addresses, I cannot know the IID generated
>>> by the host with SLAAC (it uses internal values for generating IID).
>>> Currently, I have got just three options: 1) Force clients to use
>>> EUI-64. 2) Use DHCPv6 and force users to report DUID manually. 3) Use
>>> static configuration, losing all benefits autoconfiguration has.
>>
>> #1 has been known to be bad for a long time, so I hope you don't even
>> consider it. ;-)
> 
> Actually, I do. Not for mobile clients - it is too bad for them. But I have no issue with EUI-64 for fixed clients, especially for those without human users sitting behind them (servers, printers etc.), as they have no use for privacy ... :-)
>>
>> With SLAAC, hosts do their own thing, such as generating addresses. If
>> you don't like SLAAC because you cannot predict addresses, then... don't
>> use SLAAC. ;-)
>>
> I don't like that we have been forced to use SLAAC when implementing IPv6 in our network, as the SLAAC is the only required autoconfiguration option (the DHCPv6 is not mandatory). Back then, the EUI-64 was the only IID option - so we could use it for AAAA records. Then privacy extensions came along, followed by RFC7217 - which rendered EUI-64 AAAA-generated records useless and broken. So it seems that the only option left is the non-mandatory DHCPv6. If there is not and should not be any other way, then it is vital for IPv6 deployment, so DHCPv6 MUST be mandatory for every client device.
> 
> If the suggested DHCPv6-PD for a client should be an alternative for DHCPv6, then it must allow either to predict IID or there has to be a way how to secure Dynamic DNS updates. The securing of the DDNS would need to consist of indicating to a client what names it is allowed to modify/register and some way how to negotiate TSIG for it. Most importantly, it had to be administratively effortless and automated.
>>
>>
>>> What happened at our university (fully dual-stack) was that when the
>>> IPv6 was deployed, there was only EUI-64 we had made, for every
>>> registered device in the network, both A and AAAA records. When the
>>> privacy extension came, we had to abandon the idea of making
>>> automated EUI-64-based AAAA records.
>>
>> If you wanted, you could map MAC <--> IPv6 address, and create DNS names
>> from there.
>>
> Yes, it was possible when the EUI-64 was the only option for SLAAC, or with DHCPv6 when the relay/server provides information about client MAC (not always the case) or when a client is using DUID-LL or DUID-LLT (not recommended now) or collect it from the neighbor table (resource heavy). It is not an easy task nowadays.
>>
>>> I'm not saying that IID has to be a fixed value known to everybody.
>>> It can be, for example (just to illustrate an idea): SHA256(Client
>>> DUID + Delegated prefix) and use first n bits where n is length of
>>> IID.
>>
>> I think we have had enough lessons suggesting: do not employ predictable
>> IDs.
> 
> For client privacy, yes. However, unpredictable IIDs caused other problems - a headache for (IPv6) network administrators being one of them. :-)
> 
> Best Regards,
> Martin
>